CVE-2024-9644
Four-Faith F3x36 bapply.cgi Auth Bypass
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- October 08, 2024
- Published Date
- February 04, 2025
- Last Updated
- February 04, 2025
- Vendor
- Four-Faith
- Product
- F3x36
- Description
- The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to an authentication bypass vulnerability in the administrative web server. Authentication is not enforced on some administrative functionality when using the "bapply.cgi" endpoint instead of the normal "apply.cgi" endpoint. A remote and unauthenticated can use this vulnerability to modify settings or chain with existing authenticated vulnerabilities.
- Tags
- Score
- 0.34% (Percentile: 56.13%) as of 2025-06-20
- Exploitation
- none
- Automatable
- Yes
- Technical Impact
- total
- Exploited in the Wild
- Yes (2025-06-18 00:00:00 UTC) Source
edge
CVSS Scores
CVSS v3.1
9.8 - CRITICAL
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score
SSVC Information
Exploit Status
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
The Shadowserver (via CIRCL) | 2025-06-19 12:00:28 UTC |
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Added to KEVIntel